What's new with ISO 27002:2022?
ISO 27002:2022 was released on 15th February replacing the 2013 version.
This blog discusses what revisions were made in ISO 27002:2022 to reflect the improvements in technology and updates in information security practices within a diverse range of industries, businesses, and governments. We will also explain how the updated structure has been simplified for ease of use.
What has changed in ISO 27002:2022
- 35 controls are now realigned into 4 sections/domains. The 4 sections/domains are Organisational Controls, People Controls, Physical Controls, and Technological Controls.
- The security controls contained in Annex A has been updated to a total of 93 controls, down from 114 controls
- 1 control has been split i.e. Control 18.2.3 Technical Compliance Review into:
- 5.3.6 – Compliance with policies, rules, and standards for information security
- 8.8 – Management of technical vulnerabilities
- There are now 11 new controls which include threat intelligence, information security for use of cloud services, ICT readiness for business continuity, physical security monitoring, configuration management, information deletion, data masking, data leakage prevention, monitoring activities, web filtering, and secure coding
- 23 controls have been renamed
- 24 merged controls have arisen from 57 original controls
What's new in ISO 27002:2022
The use of a control objective has been replaced by a “Purpose” component in ISO 27002:2022. This new addition helps explain the need to implement the control and ensures appropriate flow of information takes place conducive to information security.
Another important addition is the “Attribute to control” component which establishes a fundamental set of criteria for categorising and filtering controls. Not only does this help address the enhancement of risk assessment and treatment, but it also improves the understanding of controls. Finally, this component integrates with known and/or comparable definitions of other well-crafted security frameworks such as NIST CSF or CIS Controls. Each control now has the following attributes:
- Control type – preventative, detective, corrective
- Information security properties – relating to confidentiality, integrity, availability
- Cybersecurity concepts – concepts such as identify, protect, detect, respond, recover
- Operational capabilities – governance, asset management, information protection, HR security, physical security, etc.
- Security domains – governance and ecosystem, protection, defence, resilience
ISO 27002’s relationship with ISO 27001
ISO 27001 is an internationally recognised standard which can be used as a framework for effective information security. The standard requires businesses to identify their information security risks and select suitable controls to mitigate them.
ISO 27001’s Annex A controls – the core information security controls - are expanded upon in ISO 27002. Companies that implement ISO 27001 must refer to ISO 27002 to learn how to implement best security practices for ISO 27001 certification.
The key difference between ISO 27001 and ISO 27002:2022 is that you can receive ISO 27001 certification for your business, you cannot receive ISO 27002 certification. ISO 27002:2022 instead serves as supporting material to carry out the requirements and controls of ISO 27001.
What's in store for those interested in implementing ISO 27001?
At InfoTrust, we consult on ISO/IEC 27001 standards and are perfectly placed to help you towards implementing these standards and strengthening your security posture. To find out more about the security consulting services we offer, contact us today.
see our
Related resources
In today’s digital age, we all use a vast amount of information to conduct our business activities, sharing, and interacting with data across multiple devices and networks. As such confidentiality, integrity and availability are key. You only have to look at recent news headlines to realise that even organisations with comprehensive security strategies are still vulnerable to cybersecurity breaches. Vulnerabilities can lie within the technology being used, the cyber-awareness of its employees, and the sophistication of attacks.
During the great cloud rush, many organisations moved to various cloud environments, for the productivity advantages, improved reliability and security compared with running on premise environments. But the naysayers conveyed the risks associated of security concerns and outages, having the potential to bring down a company or even an economy if a there was a massive outage.
Based on InfoTrust analysis at the start of 2019 of over 9000 Australian company domain MX and SPF records, over a third of these organisations rely on Microsoft O365 Productivity suite.
This includes some of Australia’s largest organisations that would undoubtedly disrupt an economy if they were without email for a sustained period of time.
As you may be aware, from July 1 2019, all APRA regulated entities will be required to adhere to a new prudential standard, CPS 234. According to APRA, “this Prudential Standard aims to ensure that an APRA-regulated entity takes measures to be resilient against information security incidents (including cyber-attacks) by maintaining an information security capability commensurate with information security vulnerabilities and threats.”
Mimecast recently released its State of Email Security Report for 2021. The fifth edition of its annual report used interviews with over twelve hundred of information technology and cybersecurity professionals across the globe to gather vital cybersecurity insights. The report offers an insight into the latest email threats along with advice on how to build cyber resilience and mitigate the risks of email-borne attacks.
Last month CrowdStrike released its 2020 Global Threat Report, reflecting on the past year’s cybercrime and the types of attacks and techniques criminals have been utilising. In this blog post, we take a look at the key trends from the report and what they mean to Australian businesses.
Earlier this month the CrowdStrike® Falcon® Overwatch™ team released their 2018 mid-year review, “Observations from the Front-Lines of Threat Hunting”. InfoTrust discusses the front-line and why security is everyone’s business. A brief precis, some thought provocation, and insight (hopefully) are below.
We're Here To Help